Fortra GoAnywhere MFT SFTP Brute Force Vulnerability
The National Vulnerability Database has disclosed CVE-2026-0972, a critical vulnerability in Fortra’s GoAnywhere MFT. This flaw affects SFTP services prior to version 7.10.0, specifically when web users are configured for SSH key-based authentication. The system fails to enforce login attempt limits, creating a significant attack surface.
This lack of rate limiting allows attackers to repeatedly guess SSH keys via brute force. While SSH keys are inherently more secure than passwords, their strength relies on proper implementation and protection. Without login attempt throttling, a sufficiently persistent attacker can eventually compromise accounts, even with strong keys.
The CVSS score of 7.3 (HIGH) underscores the severity, with an attack vector that requires no user interaction and can be executed remotely (AV:N/UI:N). This directly impacts confidentiality, integrity, and availability (C:L/I:L/A:L) as successful brute-forcing grants unauthorized access and potentially allows data manipulation or exfiltration. Defenders must prioritize patching and review their GoAnywhere MFT configurations immediately.
What This Means For You
- If your organization uses Fortra's GoAnywhere MFT for SFTP, you are exposed. Immediately patch to version 7.10.0 or later. Audit your web user configurations to identify any relying solely on SSH keys without additional multi-factor authentication. Assume any unpatched GoAnywhere MFT instance with SSH key-only access is a ticking time bomb.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Fortra GoAnywhere MFT SFTP Brute Force via SSH Key Guessing - CVE-2026-0972
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-0972 | Vulnerability | CVE-2026-0972 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 21, 2026 at 18:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.